• Title/Summary/Keyword: Identity Based

Search Result 2,306, Processing Time 0.033 seconds

PBFT Blockchain-Based OpenStack Identity Service

  • Youngjong, Kim;Sungil, Jang;Myung Ho, Kim;Jinho, Park
    • Journal of Information Processing Systems
    • /
    • v.18 no.6
    • /
    • pp.741-754
    • /
    • 2022
  • Openstack is widely used as a representative open-source infrastructure of the service (IaaS) platform. The Openstack Identity Service is a centralized approach component based on the token including the Memcached for cache, which is the in-memory key-value store. Token validation requests are concentrated on the centralized server as the number of differently encrypted tokens increases. This paper proposes the practical Byzantine fault tolerance (PBFT) blockchain-based Openstack Identity Service, which can improve the performance efficiency and reduce security vulnerabilities through a PBFT blockchain framework-based decentralized approach. The experiment conducted by using the Apache JMeter demonstrated that latency was improved by more than 33.99% and 72.57% in the PBFT blockchain-based Openstack Identity Service, compared to the Openstack Identity Service, for 500 and 1,000 differently encrypted tokens, respectively.

Enhancing Identity Privacy Using Identity-Based Encryption in Access Networks of 3GPP (3GPP 접속 망에서 ID 기반 암호를 이용한 신원 프라이버시 개선 연구)

  • Jung, Yonghyun;Lee, Dong Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.361-372
    • /
    • 2016
  • Identity Privacy issues such as exposures of IMSIs(International Mobile Subscriber Identities) in access network have been consistently raised throughout GSM, UMTS, LTE in 3GPP. The 3GPP specification uses temporary identities instead of IMSI to ensure anonymity of the user. Even if temporary identities are disclosed, Identity Privacy may be maintained at a safe level by security policies such as no linkability and periodic update. But in case of IMSI, it cannot be changed even though it is exposed. There still exist some situations that IMSI is used in clear text for the authentication. Therefore, a protective mechanism for the identity confidentiality is needed. In this paper we propose a protocol based on IBE(Identity-based Encryption) to protect permanent identities in access network. By simplifying the scheme, this protocol has minimized the system impact on current 3GPP environment. And this scheme can be applied to all kind of permanent identities and 3GPP AKA(Authentication and Key Agreement) protocols in access network.

Is Sorting Hat in Harry Potter Identity Identifier for Adolescents?

  • Bahn, Geon Ho;Sun, Je Young Hannah;Hwangbo, Ram;Hong, Minha;Park, Jin Cheol;Cho, Seong Woo
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.28 no.1
    • /
    • pp.38-43
    • /
    • 2017
  • This study analyzes the role of the Sorting Hat in structuring the identity of the characters in the Harry Potter series written by J. K. Rowling. In the different stages of adolescence, one explores and re-establishes one's identity. One's sense of identity is determined by the commitments made regarding personal and social traits. However, it is difficult to establish a concrete identity formation process theory that is communicable to adolescents. In Harry Potter, the characters' identities are reflected upon the Sorting Hat and are continuously molded throughout the book. The Sorting Hat provides nurturing experiences based on temperament. Based primarily on their temperament, it sorts the students into four houses, each with their own distinct characteristics. Once sorted, the houses become the living and learning communities in which the students share the same dormitory and classes until their graduation. Within the community, the students seek connections, supportive relationships, and understanding within the group. The taking on of the group identity is an explanatory variable in the formation of individual identity. The Sorting Hat provides the students with stability and a safe boundary. After being sorted based on their temperament, the inexperienced and immature adolescents can explore different options under the guidance of the Hat before making a definite commitment. By presenting them with an appropriate environment (such as a mentor, friend, or family member), the Hat further shapes their identity and integrates the identity elements ascribed in the beginning. By providing experiences and interactions based on their unique temperament and environment, the Sorting Hat plays a crucial role in establishing the students' identities. The Sorting Hat can be an ideal model for finding one's identity during adolescence.

Identity of Entrepreneurs in the Evolution of a New Organizational Form: The Emergence and Growth of eBook Publishers Population in Korea (새로운 조직형태의 진화과정에서 나타나는 기업가 정체성: 한국 전자 책 출판 생태계의 발생과 성장을 중심으로)

  • Kim, Margeum;Shin, Dongyoub;Jung, Kiwon
    • The Journal of Small Business Innovation
    • /
    • v.19 no.2
    • /
    • pp.17-36
    • /
    • 2016
  • The current paper examines the role of the identity of entrepreneurs in the emergence and evolution of a new organizational form by empirically analyzing the evolution of eBook publishers in Korea from 1996 to 2011. Drawing on the recently developed identity-based theory of organizational form in the organizational ecology literature, we test hypotheses on the effects of focused and diffused organizational identities on organizational founding in an emergent organizational population. The results of our empirical analysis that tested three hypotheses about a positive relationship between focused identity and form emergenceand negative relationships between diffused (horizontal and vertical) identity and form emergence largely supported the argument of identity-based entrepreneurship. General implications are discussed.

  • PDF

Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability

  • Ki, Ju-Hee;Hwang, Jung-Yeon;Nyang, Dae-Hun;Chang, Beom-Hwan;Lee, Dong-Hoon;Lim, Jong-In
    • ETRI Journal
    • /
    • v.34 no.2
    • /
    • pp.235-244
    • /
    • 2012
  • An identity-based strong designated verifier signature scheme provides restricted verifiability only for a verifier designated by a signer and proper privacy for the signer. In this paper, we show that strong designated verifier signature schemes do not satisfy the self-unverifiability requirement in the sense that not only exposure of the verifier's secret key but also of the signer's secret key enables an attacker to verify signatures, which should have been the exclusive right of the verifier. We also present a generic method to construct a strong identity-based designated verifier signature scheme with self-unverifiability from identity-based key encapsulation and identity-based key sharing schemes. We prove that a scheme constructed from our method achieves unforgeability, non-transferability, and self-unverifiability if the two underlying components are secure. To show the advantage of our method, we present an example that outputs short signatures and we analyze its performance.

A Study on the Direction of the Public Environment Design based on the Regions' Sense of Identity (지역정체성을 기반으로 한 공공환경 디자인의 방향 연구)

  • Song, Young-Min
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.5
    • /
    • pp.98-105
    • /
    • 2012
  • The purpose of this study is to present the direction for effective public environment design by becoming aware of the social, cultural and historical values that are inherent to the specific regions once again. Concept of regions' sense of identity, regions' resources and regionality were identified as a means based on the basic cityscape plan and guideline for public design. Sample city was analyzed by extracting the regionality elements, and the results are as follows. First, appropriateness of the direction for the public environment design based on the regional identity was confirmed. The need to establish regional identity in the cityscape plan is specified when it comes to the basic goal, strategy and direction. Second, public environment design should be planned within the context of the cityscape. It is necessary to improve with integrated plan by setting up the consistent goal, direction and detailed guideline based on the basic concept of cityscape plan. Third, 'design city' requires the development of the unique design and planned techniques based on the harmony with the existing resources. It is necessary to uncover the powerful design elements that are exclusive to specific regions, and to search for differentiation and visualization to form consensus. Public environment based on regional identity will improve if the above mentioned research results are used as the basic data when it comes to the implementation of public environment design.

  • PDF

An Identity Authentication Sharing Architecture for Global Internet Environment (글로벌 인터넷 환경을 위한 신원 인증 공유 구조)

  • Park, Seungchul
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.259-270
    • /
    • 2013
  • Identity authentication sharing technologies which allow many service providers to share the result of identity authentication of an identity provider receive high attention as alternatives for current problematic identity authentications in the next-generation Internet environment, since they can provide crucial advantages including high usability, cost effectiveness of service providers, and privacy protection. However, in order for the identity authentication sharing technologies to be widely deployed in global Internet scale, the interoperability problem among different identity authentication sharing protocols and the trustworthiness issue among the participating identity providers, service providers, and users should be resolved in advance. This paper firstly analyzes current status of the protocol interoperability issue and existing trust frameworks for identity authentication sharing. And then, based on the result of analysis, this paper proposes a next generation identity authentication sharing architecture for global Internet.

A Validity Study on Brand Identity-based Strategy Model for Culture Content's One Source Multi Use : A Case Study on (브랜드 아이덴티티 기반 OSMU 전략 모델의 타당성 연구 : <해리포터 (Harry Potter)>를 중심으로)

  • Kim, Young Jae
    • Cartoon and Animation Studies
    • /
    • s.32
    • /
    • pp.289-313
    • /
    • 2013
  • According to many researches on brand management, the decision makings on brand marketing should center on the brand identity. Based on the brand management theory, Brand Identity-based OSMU Strategy has been suggested, in which the decision makings for culture content's OSMU should be focused on the brand identity of content to maximize the brand equity. In this study, the effectiveness of suggested brand identity-based OSMU strategy model is empirically studied, together with the effect on the brand equity. The study on the consumer's attitude toward the Harry Potter T-shirt with the associations of 'magic, courage and confrontation against evil' proved that consumers respond more favorably in terms of their recognition of the fit-to-content, preference and perceived quality. With this result, the positive effect of brand identity-based OSMU on consumer attitude is verified. On the other hand, the study on the effect of brand identity bearing T-shirt on brand equity did not support the hypothesis that the brand identity-based OSMU has the positive feedback effect on the brand equity of culture content. Still, while the brand equity is established through the long period of time with consumer's consistent experience on the certain culture content, the effect of brand identity-based OSMU on brand equity has a room for further discussion and research. While the ultimate goal of marketing is to create the power brand with high brand value, the further discussion on the effective culture content OSMU strategy to create a power brand is needed.

A Study on the Social Identity Described in the Dress of Pearl S. Buck′s Novels (Pearl S. Buck 소설의 복식에 나타난 사회적 정체성 연구)

  • 김희선
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.4 no.2
    • /
    • pp.5-29
    • /
    • 2002
  • This study was to analyze the social identity described in the dress of the American novelist Pearl S. Buck's (1892-1973) major works. A novelist pursues varying and refined expressions in an effort to convey to readers the character' identities of his or her own creation. In particular, Pearl S, Buck was a great writer who was awarded the Novel Literature Prize, and since her work The Good Earth recorded a world-wide bestseller, she might well be called a popular novelist. She depicted well her characters' identities from divers viewpoints with her unique delicacy and realistic expressions. For this study, the following seven works which are considered to feature the dresses for character's identity well were selected out of her 85 works: The Good Earth (1931), Sons(1932), The Mother (1934), A Housed Divided (1935), The Hidden Flower (1952), Love and the Morning Calm (1953) and Letter from Peking (1957). For an analytical tool, the content analysis method was used. In order to systematically review the social identity described in the dress individuals' identity were classified into the following categories based on the identity theories: Social identity were divided into ① age identity ② sex, gender identity ③ economic identity ④ occupational identity ⑤ political identity ⑥ religious identity ⑦ kinship identity ⑧ regional identity. The characters' age identity, sex, gender identity, economic identity, occupational identity, political identity, religious identity, kinship identity, regional identity were depicted by their dresses and physical features. All in all, it is hoped that this study would provided important cues to the understanding of the other party's identity through his or her dresses in mutual relationship: It is believed that this study would be useful because they are arranged through the analysis of the dresses featured in the great writer's works using a consistent framework of analysis.

  • PDF